The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics and supply chain management to reduce costs, times or improve services, In this study Three algorithms were proposed to solve the transport matrix (Range(R), Arithmetic Mean(AM), Cost Slop(CO)), and this algorithm must meet the requirements of problem restrictions and goals to reach good solutions, and may sometimes be the optimal solutions so we will adopt any solutions that are the best and optimal through our findings in the application of heuristic algorithms and based on the final results can be based on the heuristic method., The research concluded that the best reasoning method is the (arithmetic mean(AM)) because it gave the best results in reducing the total (cost and time) before and after the optimization method (MODI), It also gave the cost inclination method less total costs and time higher than the method of arithmetic mean After conducting the optimization method(MODI)
Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreThe non-isothermal crystallization kinetics and crystalline properties of nanocomposites poly butyleneterephthalate, [PBT] /multiwalled-carbon nanotubes (MWCNTs) were tested by differential scanning calorimetry (DSC). PBT/(MWCNTs) nanocomposite was prepared by ultrasonicated of MWCNTs (0.5, 1, 2, 4 wt %) in dichloromethane (DCM) and after that the powdered PBT polymer was added to the MWCNTs solution. The non-isothermal crystallization results show that increasing the MWCNTs contents, decreased the melting temperature (Tm) of PBT/(MWCNTs) nanocomposite as compared with pure PBT, while resulting in improving the degree of crystallinity. These results indicated that a little amount of MWCNTs can be evident strong nucleating agent in PBT na
... Show MoreThe estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreIn this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.
Photos of the backwardness of the Muslims and their backwardness in creating
sustainable development policies have driven them to a state of civilization , which witnesses
Avckaddoha time ago and not disrupt the adversary is a phenomenon thought the youth to
exercise its role and duty in the construction and development of the state witnesses Mdanah
civilized nation.
The vigilance thought the youth of its slumber correct form could provide opportunities for
growth and development in the Arab and Islamic worlds, and both material and moral support
through the creation model youth Islamic social role models, but that the image of the model
, , - 1